mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
45 lines
1.2 KiB
C
45 lines
1.2 KiB
C
|
/* SPDX-License-Identifier: GPL-3.0-or-later
|
||
|
* Copyright © 2021 The TokTok team.
|
||
|
*/
|
||
|
|
||
|
#ifndef C_TOXCORE_TESTING_FUZZING_FUZZ_ADAPTER_H
|
||
|
#define C_TOXCORE_TESTING_FUZZING_FUZZ_ADAPTER_H
|
||
|
|
||
|
#include <stdint.h>
|
||
|
#include <arpa/inet.h>
|
||
|
#include <sys/socket.h>
|
||
|
|
||
|
#ifdef __cplusplus
|
||
|
extern "C" {
|
||
|
#endif
|
||
|
|
||
|
/**
|
||
|
* @brief Init function for the fuzzing harness
|
||
|
* @param buf Begin of fuzz data
|
||
|
* @param length Length of buf
|
||
|
*/
|
||
|
void network_adapter_init(const uint8_t *buf, size_t length);
|
||
|
|
||
|
/* The following functions intercept calls to standard network functions for fuzzing purposes and return data from the fuzz buffer. */
|
||
|
|
||
|
ssize_t fuzz_sendto(int sockfd, const void *buf, size_t len,
|
||
|
int flags, const struct sockaddr *addr,
|
||
|
socklen_t addrlen);
|
||
|
|
||
|
ssize_t fuzz_send(int sockfd, const void *buf, size_t len, int flags);
|
||
|
|
||
|
ssize_t fuzz_recvfrom(int sockfd, void *buf, size_t len,
|
||
|
int flags, struct sockaddr *src_addr,
|
||
|
socklen_t *addr_len);
|
||
|
|
||
|
ssize_t fuzz_recv(int sockfd, void *buf, size_t len, int flags);
|
||
|
|
||
|
/* The following functions intercept generation of random data */
|
||
|
void fuzz_random_bytes(uint8_t *rnd, size_t length);
|
||
|
|
||
|
#ifdef __cplusplus
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
#endif // C_TOXCORE_TESTING_FUZZING_FUZZ_ADAPTER_H
|